Understanding Latent Interactions in Online Social Networks

Size: px
Start display at page:

Download "Understanding Latent Interactions in Online Social Networks"

Transcription

1 Understanding Latent Interactions in Online Social Networks Jing Jiang,ChristoWilson,XiaoWang,PengHuang,WenpengSha, Yafei Dai and Ben Y. Zhao Peking University, Beijing, China U. C. Santa Barbara, Santa Barbara, CA, USA ABSTRACT Popular online social networks (OSNs) like Facebook and Twitter are changing the way users communicate and interact with the Internet. A deep understanding of user interactions in OSNs canprovide important insights into questions of human social behavior, and into the design of social platforms and applications. However, recent studies have shown that a majority of user interactions on OSNs are latent interactions,passiveactionssuchasprofilebrowsing that cannot be observed by traditional measurement techniques. In this paper, we seek a deeper understanding of both visible and latent user interactions in OSNs. For quantifiable data on latent user interactions, we perform a detailed measurement study on Renren, the largest OSN in China with more than 15 million users to date. All friendship links in Renren are public, allowing us to exhaustively crawl a connected graph component of 42 million users and 1.66 billion social links in 9. Renren also keeps detailed visitor logs for each user profile, and counters for each photo and diary/blog entry. We capture detailed histories of profile visits over a period of 9 days for more than 61, users in the Peking University Renren network, and use statistics of profile visits to study issues of user profile popularity, reciprocity of profile visits, and the impact of content updates on user popularity. We find that latent interactions are much more prevalent and frequent than visible events, non-reciprocal in nature, and that profile popularity are uncorrelated with the frequency of content updates. Finally, we construct latent interaction graphs as models of user browsing behavior, and compare their structural properties against those of both visible interaction graphs and social graphs. Categories and Subject Descriptors J.4 [Computer Applications]: Social and behavioral sciences; H.3.5 [Information Storage and Retrieval]: Online Information Services General Terms Human factors, Measurement, Performance Permission to make digital or hard copies of all or part of this workfor personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. IMC 1, November 1 3, 1, Melbourne, Australia. Copyright 1 ACM /1/11...$1.. Keywords Latent interactions, Online social networks 1. INTRODUCTION Not only are online social networks (OSNs) popular tools for interaction and communication, but they have the potential to alter the way users interact with the Internet. Today s social networks already count close to one billion members worldwide. Facebook, the most popular OSN, has more than 5 million active users [26], and has surpassed Google as the most visited site on the Internet [3]. Increasingly, Facebook and Twitter are replacing and search engines as users primary interfaces to the Internet [9, 15]. This trend is likely to continue, as networks like Facebook seek to personalize the web experience by giving sites access to information about their visitors and their friends, through new platforms such as OpenGraph [23]. Adeepunderstandingofuserinteractionsinsocialnetworks can provide important insights into questions of human social behavior, as well as the design of social platforms and applications. For example, gauging the level of reciprocity in social interactions can shed light on the factors that motivate interactions. In addition, understanding how interactions are distributed between friends can assist in tracking information dissemination in social networks, thus identifying popular or influential userstotarget in branding and ad campaigns [6, 11, 14]. Finally, lessons from studying how users interact through different communication tools can guide the design of new, more engaging mechanisms for social interaction. Initial measurement studies [1, 22, 29] of OSNs focused on topological characteristics of the social graph, the underlyingstructures of these services that capture explicit relationships between users. To better understand the true nature of relationships between OSN users, more recent work has shifted focus to measuring observable social interactions [7, 19, 28, 29]. By examining records of interaction events across different links, the studies distinguishclose-knit, active relationships from weak or dormant relationships, and derive amoreaccuratepredictivemodelforsocialbehavior. Recently, two significant studies [3, 25] used clickstream data at the network level to capture the behavior of OSN users, and revealed that passive or latent interactions such as profile browsing often dominate user events in a social network [3]. Unfortunately, these studies have been constrained by several limitations of clickstream data. First, the type of data captured in aclickstreamishighlydependentonthetimerangeoftheclickstream. Captured events are also from the perspective of the active user, making it challenging to correlate events across time and users. Second, clickstream data is also highly dependent on the

2 structure of the OSN site, and can be extremely challenging to reduce large volumes of data to distinct user events. Finally, each application-level user event generates a large volume of clickstream data, and extremely large clickstreams are needed to capture a significant number of user events. These properties of verboseness and complexity mean that it is extremely difficult to gather enough clickstream data to study user interactions comprehensively at scale. However, a comprehensive and large study is necessary to answer many of the deeper questions about user behavior and interactions, such as: are user interactions reciprocal, do latent interactions such as profile browsing reflect the same popularity distributions as visible actions like user comments, what can users do to become popular and draw more visitors to their pages? In this paper, we seek to answer these and other questions in our search for a deeper understanding of user interactions in OSNs. To address the challenge of gathering data on latent interactions, we perform a large-scale, crawl-based measurement of the Renren social network [24], the largest and most popular OSN in China. Functionally, it is essentially a clone of Facebook, with similar structure, layout and features. Like Facebook, Renren also evolved from a university-based social network (a predecessor called Xiaonei). Unlike Facebook, Renren has two unique features that make it an attractive platform to study user interactions. First, while Renren users have full privacy control over their private profiles, their friend lists are public and unprotected by privacy mechanisms. This allowed us to crawl an exhaustive snapshot of Renren s largest connected component, producing an extremely large social graph with 42.1 million nodes and 1.66 billion edges. Second, and perhaps more importantly, Renren user profiles make a variety of statistics visible to both the profile owner and her visitors. Each user profile keeps a visible list of recent visitors who browse the profile, sorted in order, and updated in real-time. Each photo and diary entry also has its own page with a count of visits by users other than the owner. These records are extremely valuable, in that they expose latent browsing events to our crawlers, granting us an unique opportunity to gather and analyze large scale statistics on latent browsing events. Our study. Our study of latent user interactions includes three significant components. First, webeginbycharacterizingproper- ties of the large Renren social graph, and compare them to known statistics of other OSNs, including Facebook, Cyworld, Orkut and Twitter. Our second component focuses on questions concerning latent interactions, and constitutes the bulk of our study. We describe a log reconstruction algorithm that uses relative clocks to merge visitor logs from repeated crawls into a single sequential visitor stream. We repeatedly crawl users in the Peking University Renren network over a period of 9 days, extract profile visit history for 61K users, and examine issues of popularity, visitor composition, reciprocity, and latency of reciprocation. We compare user popularity distributions for latent and visible interactions, and use per-object visit counters to quantify the level of user engagement generated from user profiles, photos, and diary entries. We also study correlation of different types of user-generated content with a user s profile popularity. Finally, in our third component, we build latent interaction graphs from our visitor logs, and compare their structure to those of social graphs and interaction graphs. We also revisit the issue of experimental validation for social applications, and perform a case study of the impact of different social graphs on evaluating information dissemination algorithms. Our study provides a number of insights into user behavior on online social networks, including: Users profile popularity varies significantly across the population, and closely follows a Zipf distribution. Profile visits have extremely low reciprocity, despite the fact that Renren users have full access to the list of recent visitors to their profile. Compared to visible interactions, latent profile browsing is far more prevalent and more evenly distributed across a user s friends. Profile visits are less likely to be repeated than visible interactions, but are more likely to generate visible comments than other content such as photos and diary entries. For all users, regardless of their number of friends, profile popularity is not strongly correlated with frequency of new profile content. Finally, we use our data to construct latent interaction graphs that capture browsing activity between OSN users. Our analysis finds that latent interaction graphs exhibit general Power-law features, fall between social and visible interaction graphs in termsof connectivity, but show less local clustering properties than both. 2. METHODOLOGY AND INITIAL ANALYSIS Before diving into detailed analysis of user interaction events, we begin by providing background information about the Renren social network and our measurement methodology. We then give more specifics on our techniques for reconstructing profile browsing histories from periodic crawls. Using a random subset of user profiles, we perform sampling experiments to quantify the expected errors introduced by our approach. Finally, we analyze characteristics of the Renren social graph, and compare it to known graph properties of existing social graph measurements. 2.1 The Renren Social Network Launched in 5, Renren is the largest and oldest OSN in China. Renren can be best characterized as Facebook s Chinese twin,with most or all of Facebook s features, layout, and a similar user interface. Users maintain personal profiles, upload photos, write diary entries (blogs), and establish bidirectional social links with their friends. Renren users inform their friends about recent events with 1 character status updates, much like tweets on Twitter. Similar to the Facebook news feed, all user-generated updates and comments are tagged with the sender s name and a time stamp. Renren organizes users into membership-based networks, much like Facebook used to. Networks represent schools, companies, or geographic regions. Membership in school and company networks require authentication. Students must offer an IP address, address, or student credential from the associated university. Corporate addresses are needed for users to join corporate networks. Renren s default privacy policy makes profiles of users in geographic networks private. This makes them difficult to crawl [29]. Fortunately, profiles of users in authenticated networks are public by default to other members of the same network. This allowed us to access user profiles within the Peking University network, since we could create nearly unlimited authenticated accounts using our own block of IP addresses. Like Facebook, a Renren user s homepage includes a number of friend recommendations that encourage formation of new friend relationships. Renren lists 3 users with the most number of mutual friends in the top right corner of the page. In addition, Renren shows a list of 8 popular users at the very bottom of the page. These popular users are randomly selected from the users with the most friends in the university network.

3 % of Visible Interactions Status Message Board Photo Diary Day Time 1 Time 2 Time 3 Time 4 Result A A B C D E F G H I C D E F G H I J K D _ F G H I J K EC G H I J K E L C M B C D E F G H I J K E C L C M _ Figure 1: Daily distribution of comments across applications. Figure 2: Integrating multiple visitor lists captured by multiple crawls of the same profile into a single history. Unique features. Renren differs from Facebook in several significant ways. First, each Renren user profile includes a box that shows the total number of visitors to the profile, along with names and links to the last 9 visitors ordered from most to least recent. In addition, Renren also keeps on each individual photo and diary page a visible counter of visitors (not including the user himself). These lists and counters have the same privacy settings as themain profile. They have the unique property of making previously invisible events visible, and are the basis for our detailed measurements on latent user interactions. AsecondcrucialfeatureisthatfriendlistsinRenrenarealways public. Users have no way to hide them. This allowed us to perform an exhaustive crawl of the largest connected component in Renren (42.1 million users). This contrasts with other OSNs, where full social graph crawls are prevented by user privacy policies that hide friendship links from the public. The exception is Twitter, which behaves more like a public news medium than a traditional social network [16]. In addition, comments in Renren are threaded, i.e. each new comment is always in response to one single other event or comment. For example, user A can respond to user B s comment on user C s profile, and only B is notified of the new message. Thus we can precisely distinguish the intended target of each comment. One final difference between Renren and Facebook is that each standard user is limited to a maximum of 1, friends. Users may pay a subscription fee to increase this limit to 2,. From our measurements, we saw that very few users (.3%) took advantage of this feature. 2.2 Data Collection and General Statistics Like Facebook, Renren evolved from a social network in a university setting. Its predecessor was called Xiaonei, literally meaning inside school. In September 9, Renren merged with Kaixin, the second largest OSN in China, and absorbed all of Kaixin s user accounts. Crawling the Renren social graph. We crawled the entire Renren network from April 9 to June 9, and again from September to November of 9. We seed crawlers with the 3 most popular users profiles, and proceeded to perform a breadthfirst traversal of the social graph. During the crawl, we collect unique userids, network affiliations, and friendship links to other users. For our study, we use data from our last crawl, which wasan exhaustive snapshot that included 42,115,59 users and 1,657,273,875 friendship links. While this is significantly smaller than the 7 million users advertised by Renren in September 9, we believe the discrepancy is due to Kaixin users who were still organized as a separate, disconnected subgraph. We describe properties of the social graph later in this section. Crawling the PKU network. We performed smaller, more detail oriented crawls of the PKU network between September and November of 9 (9 days) to collect information about user s profiles and interaction patterns. This methodology works because thedefault privacypolicyforauthenticatednetworks istomake full profiles accessible to other members of the same network. Since we collected the network memberships of all users during our complete crawl, we were able to isolate the,973 members of the PKU network to seed our detailed crawl. Of these users, 61,5 users had the default, permissive privacy policy, enabling us to collect their detailed information. This covers the majority of users (.8%) in the PKU network, and provides overall network coverage similar to other studies that crawled OSN regional networks [29]. As part of our PKU crawls, we gathered all comments generated by users in message board posts, diary entries, photos, and status updates. This data forms the basis of our experiments involving visible interactions. Our dataset represents the complete record of public visible interactions between users in the PKU network. In total, 19,782,1 comments were collected, with1,218,911 of them originating in the September to November 9 timeframe. Figure 1 plots the percentage of comments in various applications each day. The most popular events to comment on are status updates, which accounts for roughly 55% of all daily comments. Message boards cover 25%, while diary and photo each account for roughly 1%. Privacy and data anonymization. Our study focuses on the structure of social graphs and interaction events between users. Since we do not need any actual content of comments, photos, or user profiles, we waited for crawls to complete, then went through our data to anonymize userids and strip any private data from our dataset to protect user privacy. In addition, all user IDs were hashed to random IDs, and all timestamps are replaced with relative sequence numbers. We note that our group has visited and held research meetings with technical teams at Renren, and they are aware of our ongoing research. 2.3 Measuring Latent User Interactions In addition to visible interactions generated by users in the PKU network, we also recorded the recent visitor records displayed on each user s profile. This data forms the basis of our study of latent interactions.

4 # of Average Daily Visits mins 85 1 hour 12 hours 24 hours Total Missed Visits over 2 Days (vs. 15min) Figure 3: Average daily visit counts of user profiles. Figure 4: Number of visits missed when we lower crawler frequency from a high of once every 15 minutes. Reconstructing Visitor Histories. Crawling Renren for recent visitor records is complicated by two things. First, each user s profile only lists the last 9 visitors. This means that our crawler must be constantly revisiting users in order to glean representative data, as new visitors will cause older visitors to fall off the list. Clearly we could not crawl every user continuously. Frequent crawls leave the ID of our crawler on the visitor log of profiles, which has generated unhappy feedback from profile owners. In addition, Renren imposes multiple per-account rate limits that slow our crawler significantly despite our large number of crawler accounts. Thus, we designed our crawler to be self-adapting. This means that we track the popularity and level of dynamics in different user profiles, and allocate most of our requests to heavily trafficked user profiles, while guaranteeing a minimum crawl rate (1/day) for low traffic users. The individual lists from each crawl contain overlapping results, which we integrate into a single history. The second challenge to crawling recent visitor records is that each visitor is only shown in the list once, even if they visit multiple times. Repeat visits simply cause that user to return to the top of the list, erasing their old position. This makes identifying overlapping sets of visitors from the iterative crawls difficult. To solve these two challenges, we use a log-integration algorithm to concatenate the individual recent visitor lists observed during each successive crawl. More specifically, some overlapping sets of visitors exist in successive crawl data, and our main task is to find new visitors and remove overlaps. There are two kinds of incoming visitors: new users, who do not appear in the previous list, and repeat users, who appear in the prior list at a different relative position. The first kind of incoming visitor is easily identified, since his record is completely new to the recent visitor list. New visitors provide a useful checkpoint for purposes of log-integration, since other users behind them in the list are also necessarily new incoming visitors. The second type of incoming visitor, repeat users, can be detected by looking for changes in sequence of the recent visitor list. If a user repeatedly visits the same profile in-between two visits of other users, nothing changes in the recent visitor list. Therefore, consecutive repeat visits are ignored by our crawler. Figure 2 demonstrates our integration algorithm. We observe that visitors ABCDEFGHI viewed a user s profile at some time before our first crawl. New users view the profile and are added to the recent visitor list by the second crawl at time 2. We re-observe the old sequence CDEFGHI, andidentifyjk as new visitors, since JK do not exist in the previous visitor list. Next, we compare recent visitor lists at time 2 and 3. We find that E is before K in the recent visitor list crawled at time 2, but this order is changed at time 3. This means that at some time before the third crawl user E revisited the target and changed positions in the list. Thus we identify E as anewvisitor. SinceC is behind E at time 3, C is also identified as a new visitor. Our integration algorithm also works correctly at time 4. User L has not been observed before, and thus L, plus subsequent visitors C and M,areallclassifiedasnewvisitors. Overall, from the 61,5 user profiles we continuously crawled, we obtained a total of 8,34,664 total records of visits to user profiles in the PKU network. After integrating these raw results, we are left with 1,863,168 unique profile visit events. This highreduction (77%) is because most profiles receive few page views, and thus overlaps between successively crawled results are very high. Although Renren does not show individual recent visitors of user diaries and photos, it does display the total number of visits, which we crawled as well. Impact of Crawl Frequency. We are concerned that our crawls might not be frequent enough to capture all visit events to a given profile. To address this concern, we took a closer look at the impact of crawler frequency on missing visits. First, we take all of the profiles we crawled for visit histories, and computed their average daily visit count between September and November 9. We plot this as a CDF in Figure 3. Most users (99.3%) receive <= 8visits per day on average. Since Renren shows 9 latest visitors, crawling aprofileonceeverydayshouldbesufficienttocaptureallvisits. While our crawler adapts to allocate more crawl requests to popular, frequently visited profiles, we guarantee that every profile is crawled at least once every 24 hours. Next, we select 1, random PKU users and crawl their recent visitors every 15 minutes for 2 days. We use the data collected to simulate five frequencies for crawling process, namely 15 minutes, 3 minutes, 1 hour, 12 hours and 1 day. Then we use the log-integration algorithm to concatenate the individual recent visitor lists at different crawling frequencies. For every person, we compute the number of visits missed by the crawler when we reduce the frequency, beginning with visits every 15 minutes. We plot CDF of these deviations in Figure 4. As we see, for 88% of users, there are no additional visits missed when we reduce the crawler rate from once every 15 minutes to once per day. Only for a very small group of users (.7%) is the number of missing visits greater than 1 when crawling at once per day. Figure 3 also shows that less than.7% of all users receive more than 9 visits per day. Only these users would require more than one crawl per day to collect a full history of their visits. Since we allocate the bulk of ourcrawler requests to these high popularity users (and crawl once per day for

5 Network Users Crawled Links Crawled Avg. Degree Cluster Coef. Assortativity Avg. Path Len. Renren 42,115K 1,657,273K Facebook [29] 1,697K 8,265K Cyworld [1] 12,48K 19,589K Orkut [22] 3,72K 223,534K Twitter [13] 88K 829K N/A Table 1: Topology properties of social networks % of Users (CCDF) k nn Social Degree Social Degree Figure 5: Node Degree Distribution in the Renren network Figure 7: Renren k nn Distribution Clustering Coefficient Social Degree Figure 6: Renren Clustering Coefficient Distribution the rest), we are relatively confident that very few visits aremissed by our crawls. 2.4 Social Graph Analysis In this section, we analyze the topological properties of the entire Renren social graph by focusing on salient graph measures. Table 1 shows some general properties of Renren, such as average degree, clustering coefficient, assortativity, and average pathlength as compared to other social networks. Our Renren dataset is larger than most previously studied OSN datasets, the exceptions being recent measurements of the Twitter network [4, 16]. However, our dataset shares similar properties with prior studies [7, 22,29].This confirms that Renren is a representative social network, and the behavior of its users is likely to be indicative of users in other OSNs like Facebook. Figure 5 plots the complementary cumulative distribution function (CCDF) of user social degrees in the Renren network, and shows that Renren s network structure roughly follows a powerlaw [2]. We compute that the power-law curve fitting the social degree CCDF has an alpha value of 3.5, with fitting error of.2. This alpha value is significantly higher than that found for Facebook (1.5), Orkut (1.5), and Twitter (2.4). We also look at Renren s clustering coefficient, which assesses the level of local connectivity between nodes. In undirectedgraphs, the clustering coefficient of a person is defined as the ratio of the number of links over all possible connections between one s friends. The clustering coefficient of the entire network is defined by the average of all individual clustering coefficients. Renren s average clustering coefficient is only.63, implying that Renren friend relationships are more loosely connected than the other social networks studied in Table 1. Figure 6 displays the distribution of clustering coefficient versus node degree. As expected for a social network, users with lower social degrees have higher clustering coefficients, thus demonstrating high levels of clustering at the edgeof the social graph. Theassortativity coefficient measures the probability forusers to establish links to other users of similar degree [29]. It is calculated as the Pearson correlation coefficient of the degrees of node pairs for all links in a graph. A positive assortativity coefficientindicates that users tend to connect to other users of similar degree, and a negative value indicates the opposite trend. Renren s assortativity is.15, implying that connections between like-degree users are numerous. Figure 7 displays node degree correlation (k nn) versus node degree. k nn is a closely related metric to assortativity. The positive correlation starting around degree demonstrates that higher-degree users tend to establish links with other high-degree users. These chains of well-connected super-users form the backbone of the social network. Average path length is the average of all-pairs-shortest-paths in the social network. It is simply not tractable to compute shortest path for all node pairs, given the immense size of our social graph. Instead, we choose random users in the network, perform Dijkstra to build a spanning tree for each user in the social graph, and compute the length of their shortest paths to all other users in the network. As shown in Table 1, the average path length in Renren is 5.38, which agrees with the six-degrees of separation hypothesis []. It is not surprising to see that average path length is

6 % of Isolated Users (CDF) Friends Profile Visits Number of... Number of Daily Visits Visit Zipf Distribution 1 1 Users Sorted By Popularity Figure 8: Social degree and total number of visits for isolated users 1 1 Popularity Figure 9: CDF of user profile popularity defined by visits longer in Renren than prior results from Facebook [29], sincethose path lengths were computed over smaller subgraphs representing regional networks. It is surprising, however, when we compare it to results from Cyworld [7], since the two networks are similar in size and completeness. One reasonable explanation is that connectivity between Internet users in the Cyworld network is much stronger than connectivity between users in the Renren network. Strongly Connected Component Analysis. User s online friendship links often correspond closely with their offlinerelationships [17]. Thus, it is natural to assume that college students would have many online friends in the same campus network. This behavior should manifest itself as a single, large, strongly connected component (SCC) that includes most users in the PKU network social graph. Surprising, we find that 23,43 (23.2%) of users inthe PKU network have no friends in the PKU campus network, and are therefore disconnected from the SCC. We refer to these as isolated users. To confirm these results, we measured the SCC of 9 other large university networks and discovered similar numbers of isolated users. Figure 8 shows social degrees and total number of profile visits for these isolated users. 83% of isolated users have social degrees less than 1. In addition, 7% of isolated users have less than total profile visits, meaning their profiles are rarely browsed by others. These isolated users likely abandoned their accounts soon after registration, and did not have enough time to establish links with friends within the campus network. Further analysis into the behavior and activities of these isolated users is the subject of ongoing work. Figure 1: Average number of visits per day per user % Overlap with Users Sorted By Consumption % of Users Sorted by Popularity Figure 11: Overlap between users sorted by popularity vs. sorted by consumption 3. PROPERTIES OF INTERACTION EVENTS Our work focuses on the analysis of latent interaction events and the role they play in OSNs. In our measurement of the Renren OSN, we use histories of visits to user profiles to capture latent interactions. In this section, we take a closer look at latent interactions and compare them with visible interactions from a variety of perspectives. 3.1 Popularity and Consumption We begin by analyzing the distribution of latent interactions across the Renren user-base. We define popularity as the number of views auser sprofilereceives;thisisequivalenttotheuser sin-degree of latent interactions. Figure 9 shows the distribution of user popularity. As expected, popularity is not evenly spread across the population: only 518 people (1%) are popular enough to receive more than 1, views. Conversely, the majority of users (57%) exhibit very low popularity with less than total profile views. Figure 1 shows the average number of visits users receive on a daily basis. The distribution is fitted to a Zipf distribution of the form βx α where α = and β = Popular users receive many more views per day: 141 users (.2%) are viewed more than times a day on average, with the most popular profile being viewed more than times a day. Most users (85.5%) receive less than one visit per day on average. This reinforces our finding that latent interactions are highly skewedtowards averypopularsubsetofthepopulation. Finally, we examine whether the popularity of users corresponds to their profile viewing behavior. We define consumption as the number of other profiles a user views; this is equivalent to the

7 % of Repeat Visitors % of Strangers in Visitors Figure 12: Ratio of repeat visitors Figure 14: Percentage of strangers in visitors % of Repeat Visits (PDF) One Week Days Between Repeat Visits % of Profile Visitors 1 hop 2 hops 2+ hops Users Grouped by # of Friends Figure 13: PDF of interval time between repeat visits Figure 15: Breakdown of visitors by owner s social degree user s out-degree of latent interactions. Figure 11 plots the overlap between the top users sorted by popularity, and top users sorted by consumption. The graph shows that the top 1% most popular users have 9% overlap with the top 1% biggest consumers. These users represent a hard-core contingent of social network users who are extremely active. For the most part however, users with high numbers of incoming latent interactions do not overlap with the people generating those interactions, e.g. profiles of celebrities are viewed by many users, but they are inactive in viewing others pages. This necessarily means that many (presumably average, low-degree) users actively visit others, but are not visitedinreturn. We examine the reciprocity of latent interactions in more detail in Section Composition of Visitors Next, we want to figure out the composition of visitors to user profiles. We pose two questions: first, what portion of profile visitors are repeat visitors? Second, are visitors mostly friends of the profile owner, or are they unrelated strangers? We begin by addressing the first question. We calculate the percentage of repeated visitors for each profile, and report the distribution in Figure 12. Roughly 7% of users have less than 5% repeat visitors, meaning that the majority of visitors do not browse the same profile twice. This seems to indicate the long tail of latentinteractions isgeneratedbyusers randomlybrowsingthe social graph. Next, we take a closer look at repeat profile visits. Figure 13 shows the probability density function (PDF) of the interval time between repeat visits. The graph peaks on day, meaning that users are most likely to return to a viewed profile on the same day. We will examine the causes for this behavior more closely in Sec- tion 4. The probability for repeated views decreases as the time delta expands, except for a noticeable peak at day 7. Interestingly, this shows that many users periodically check on their friends on a weekly basis. We confirmed that this feature is not an artifact introduced by our crawler or the use of RSS feeds by Renren users. Instead, we believe it may be due to the tendency for many usersto browse their friends profiles over the weekend. We now move on to our second question: what users are generating latent interactions, friends of the profile owner, or strangers. We define a stranger as any user who is not a direct friend of the target user. Like Facebook, Renren s default privacy settings allow users in the same campus network to browse each other s profiles. Renren automatically recommends popular profiles to other users in the same network, which motivates people to view non-friends profiles. However, they only recommend the users in the network with the most users. Thus this feature should have minimal impact on our analysis of visitors to the average Renren user. In order to answer our question, we calculate the percentage of visitors that are strangers and display the results in Figure 14.The results are fairly evenly divided: roughly 45% of users receive less than 5% of their profile visits from strangers. Or conversely, a slight majority of the population does receive a majority of their profile views from strangers. We want to take a closer look at what component of a profile s visitors are strangers, and how far are they from the profile owner in the social graph. In Figure 15, we group the owners of profiles together by their social degree, and compute the average breakdown of their visitors into users who are friends (1-hop), friends-offriends (2-hop) and other visitors (2+ hops). We see that for users with relatively few (< ) friends,thelargemajorityoftheirvisitors are complete strangers, with very few friends-of-friends visit-

8 Strangers Friends Average Number of Visits Day S 1 Day F 5 Days S 5 Days F Max Time Window S Max Time Window F % of Reciprocated Visits Figure 16: Average number of visits for friends and strangers Size of Intersection Set / Size of Union Set Figure 17: Ratio of reciprocated latent interactions over total latent relationships Figure 18: Probability of reciprocated profile views over various time windows for both strangers (S) and friends (F) % of Total Interactions (CDF) Visible Latent % of Top Interactive Users Figure 19: Distribution of total interactions ing. For well-connected users with friends, the majority of their visitors are direct friends, and also a significant number of friends-of-friends. Finally, for extremely popular users with more than friends, their notoriety is such that they start to attract more strangers to visit their profiles. These results confirm those from previous work that discovered many Orkut users browse profiles 2 or more hops away on the social graph [3]. Unlike friends, strangers do not build long-term relationships with profile owners. Intuitively, this would seem to indicate that repeat profile viewing behavior should favor friends over strangers. To investigate this we compute the average number of visits for strangers and friends for each profile and plot the distribution in Figure 16. Surprisingly, our results indicate that the repeat profile viewing behavior for friends and strangers is very similar, with friends only edging out strangers by a small margin. This result demonstrates that when considering information dissemination via latent interactions, the significance of non-friend strangers should not be overlooked. 3.3 Reciprocity Social norms compel users to reply to one another when contacted via visible interactions. Prior work has shown that these interactions are largely reciprocal on OSNs [29]. However, is this true of latent interactions? Since Renren users have full access to the list of recent visitors to their profile, it is possible for peopleto pay return visits to browse the profiles of their visitors. The question is, does visiting other user profiles actually trigger reciprocal visits? As the first step towards looking at reciprocity of latent interactions, we construct the set of visitors who view each user profile, and the set of people who are visited by each user. Then, we compute the intersection and union of these two sets for every user. Intuitively, intersections include people who view a given user profile and are also visited by that user, i.e. the latent interactions are reciprocated. Unions contain all latent relationships for agiven user, i.e. all users who viewed them, or they viewed. We calculate the ratio of intersection size to union size for each user and then plot the results in Figure 17. The ratio represents the number of reciprocated latent interactions divided by the total number of latent relationships. For more than 93% of users, less than 1% of latent relationships are reciprocated. This demonstrates that incoming profile views have little influence on user s profile browsing behavior. This is surprising, especially considering the fact thatusers know that their visits to a profile are visible to its owner through the visitor history feature. Next we examine the time-varying characteristics of reciprocal profile visits for both strangers and friends. We compute the number of reciprocal visits that take place within t days after the initial visit. Figure 18 shows the results for threshold t values of 1 and 5daysplustheentire9days. Aswelookatincreasinglylarger window sizes, we see more profile visits being reciprocated. However, reciprocity remains low overall. Even across the entire measurement period, 73% of users receive no reciprocal page views from strangers, and 45% of users obtain no reciprocal page views from friends. This demonstrates that even with Renren s visitor history feature, visiting other user profiles is not sufficient togenerate reciprocal visits. Compared to strangers, friends have relatively higher probability of reciprocal visits. We take a further step and quantify the lack of reciprocity forlatent interactions. For a data set of n users, if user i visits user j,then

9 Visible Latent % of Friends Involved Photo Diary Profile Average # of Comments per Page View Figure : friends Distribution of interactions among each user s Figure 21: Average number of comments per page view for different types of pages v ij =1,otherwisev ij =.Thereciprocitycoefficient[7]isdefined as (v P P i j ij v)(v ji v) i j,where v = v ij Pi j.thereciprocity (v ij v) 2 n(n 1) coefficient is measured between -1 and 1, where positive values indicate reciprocity, and negative values anti-reciprocity. The reciprocity coefficient of profile visits on Renren is only.23. In contrast, reciprocity of visible comments on Renren is.49, and the reciprocity of visible interactions on Cyworld [7] is.78. Compared to these visible interactions, latent interactions show much less reciprocity. 3.4 Latent vs. Visible Interactions In this section, we compare the characteristics of latent andvisible interactions. To understand the level of participation of different users in both latent and visible interactions, Figure 19 plots the contribution of different users to both kinds of interactions. The bulk of all visible interactions can be attributed to a very small, highly interactive portion of the user-base: the top 28% of users account for all such interactions. In contrast, latent interactions are quite prevalent across the entire population, with more than 93% of all users contributing to latent interaction events. This confirms our original hypothesis that users are more active in viewing profiles than leaving comments, potentially because of a sense of anonymity in profile browsing. Given its widespread nature, this result also underscores the importance of understanding latent interactions as a way of propagating information across OSNs. Next, we compare latent and visible interactions in coverage of friends. We compute for each user a distribution of their latent and visible interactions across their social links. We then aggregate across all users the percentage of friends involved in these events and plot the results in Figure. We see that roughly % of users only interact visibly with 5% of their friends, and no users interact with more than % of their friends. In contrast, about % of users view % or more of their friends profiles, and a small portion of the population views all of their friends profiles regularly. Thus, although not all social links are equally active, latent interactions cover a wider range of friends than visible interactions. To get a sense of how many visible comments are generated by latent interactions, we examine the average number of comments per page view for a variety of pages on Renren, including profiles, diary entries, and photos. Figure 21 plots the results. Recall that along with visible comments, Renren keeps a visitor counter for each photo and diary entry. For diary entries and photos, the conversion rate is very low: 99% of users have less than.2 comments for every photo view, and 85% people have less than.2 comments for every diary view. This indicates that most users Visible Latent Average Number of Interactions per Profile Figure 22: Average number of interactions per profile are passive information consumers: they view/read content and then move on without commenting themselves. In contrast, profile views have a higher conversion rate. Interestingly, 13% of users have a view/comment ratio greater than 1. This is because these users use profile comments as a form of instant messaging chat, leaving multiple responses and replies upon each visit. Finally, we analyze the repeat activity frequency for latent and visible interactions on Renren. In particular, we want to examine the likelihood that users will repeatedly interact with the same page once they have viewed or commented on it once. Figure 22 plots the average number of interactions each user has with profile pages. % of users view a given profile <2times.However,% of users leave 3.4 comments, almost twice the number of latent interactions. This result makes sense intuitively: for most types of data users only need to view them once to consume the data. However, comments can stimulate flurries of dialog on a given page, resulting in many consecutive interactions. 4. FACTORS INFLUENCING LATENT INTERACTIONS As shown in Section 3.1, not all users in Renren are the target of equal numbers of latent interactions. In this section, we analyze factors that may impact latent interactions in order to quantify their effect on the popularity of individual users. We examine the following factors: Friends. Does social degree directly correlate with popularity? Lifetime. Are long lived accounts more likely to be popular than newer, less active accounts? We measure the number of days

10 Popularity Friends Lifetime Diary Photo Status Share Comment - 16 (.15) 35 (.55) 1(.51) 3(.47) 1(.5) 1(.5) 2(.54) (.56) 423 (.41) 11 (.33) 41 (.24) 27 (.36) 43 (.41) 96 (.45) - 1 (.43) 792 (.24) 5 (.18) 125 (.1) 115 (.18) 155 (.23) 596 (.28) > 78 (.2) 869 (.2) 117 (.2) 251 (-.3) 236 (.1) 273 (-.5) 1581 (.1) all users 112 (.73) 263 (.75) 12 (.7) 34 (.61) 28 (.69) 39 (.72) 134 (.76) Table 2: Average value of factors affecting user popularity. Spearman s rank correlation coefficient for each value is shown in parentheses. in between a user joining and leaving Renren. Neither of these pieces of information is provided by Renren, and thus must be estimated. Join date can be approximated by the timestamp of the first comment received by a user, since the comment is likely to be a welcome message from a friend greeting the new user [29]. Because abandoned and inactive accounts can still receive comments, the best estimate of departure time is the timestamp of the last comment left by a user. User-generated content. Do users who frequently update their profiles and upload new content attract the most visitors? This includes user s status updates, diary entries, photos, and shared links to content on the web. Comments. Do users who comment frequently attract more users? Comments are snippets of text that user s can attach to other pieces of user-generated content. We divide users into 4 groups based on their popularity, calculate the average value of these factors in each group, and display the results in Table 2. All factors increase along with popularity, i.e. the most popular users also have the most friends, the oldest accounts, and generate the largest amounts of content/visible interactions. Given the drastic differences in size of each popularity group, and the average nature of the values in Table 2, it is difficult to infer definite correlations between any one factor and popularity. To analyze these correlations more specifically, we leverageatech- nique from prior work [4] called Spearman s rank correlationco- efficient (Spearman s ρ). Spearman s ρ is a non-parametric measure of the correlation between two variables that is closely related to Pearson s correlation coefficient [18]. It is defined asρ = 1 6 P (x i y i ) 2,wherex n(n 2 1) i and y i are the ranks of two different features in a data set of n users. ρ>indicatespositivecorrelation, while <indicatesnegativecorrelation. Table 2 shows Spearman s ρ in parenthesis beside the average value for each factor. Although all factors exhibit high correlation with the low popularity and all users categories, this is anartifact of the tied ranks among the (numerous) low activity users. All of these users exhibit very low interactivity and social degree, thus leading to high levels of correlation. Previous work has observed similar artifacts when analyzing all users in a large OSN dataset [4]. For the two median popularity groups (- and -), number of friends has the highest correlation with popularity. Users in these categories can be broadly defined as normal social network users. They are not celebrities; they simply use the OSN for its intended purpose of sharing information with friends. This is reflected in the fact that users in these categories show relatively high levels of correlation across all user-generated content categories. Account lifetime is a less important factor for users inthe - popularity range, given the ease with which users can quickly amass hundreds of friends on OSNs. No factor has strong correlation with popularity for users in the high popularity group. Spearman s ρ for photos and shared links are even negative. This is an important finding, as it shows popularity is not trivially gained simply by having lots of friends, or producing copious amounts of user-generated content. Therefore, there must be other factors outside the scope of our measurements that contribute to determine user popularity. One possibility is that quality, rather than quantity, of content may be a significant draw to attract visitors. Another possibility is that real-world celebrity status is the most important determining factor of online popularity. Unfortunately, we cannot quantify these factors at present. Recall that of the most popular users in the university network are recommended to users by Renren. These users account for less than 19.3% of the total users in the high popularity group, so the recommendation mechanism has limited impact on the high popularity group results. 5. LATENT INTERACTION GRAPHS Previous studies have demonstrated that taking visible interactions into account has important implications for applications that leverage social graphs [29]. These changes can be modeled by interaction graphs, whichareconstructedbyconnectingusersfrom the social graph who have visibly interacted one or more times. We have already demonstrated significant differences between latent and visible interaction patterns on Renren. To summarize these key differences briefly, latent interactions are more numerous, non-reciprocal, and often connect non-friend strangers. These results are also likely to have profound implications on applications that leverage social graphs, and thus warrant the construction of a new model to capture the properties of latent interactions. We call this new model a latent interaction graph. In this section we formally define latent interaction graphs, analyze their salient properties, and compare them to the Renren social and visible interaction graphs. 5.1 Building Latent Interaction Graphs Alatentinteractiongraphisdefinedasasetofusers(nodes)that are connected via edges representing latent interaction events between them. Unlike the social graph and visible interaction graph, we have shown that latent interaction is non-reciprocal (Section 3.3). Thus, we use directed edges to represent user s page views, unlike the social and visible interaction graphs, which are both undirected. The set of users (61,5 total) remains unchanged between the social and interaction graphs. We define latent interaction in-degree of a node as the number of visitors who have visited that user sprofile; while out-degree is the number of profiles that user has visited. We construct latent interaction graphs from our Renren data using profile views as the latent interactions. We use user comments as the visible interaction data to construct visible interaction graphs for Renren. In this paper we restrict our social, latent, and visible interaction graphs to only contain users from the PKU network, since these are the only users for which we have complete interaction records. Note that we only consider interactions that occur between users in the PKU network, as it is possible for interactionstooriginatefromortargetusersoutsidethenetworkfor whom

11 % of Users (CCDF) Social Latent (In).1 Latent (Out) Visible Degree Figure 23: CCDF of node degree for latent interaction graph, visible interaction graph and social graph. we have limited information. Also note that because non-friend strangers can view user s profiles, the latent interaction graph will contain edges between users who are not friends in the social graph. Our formulation of interaction graphs uses an unweighted graph. We do not attempt to derive a weight scheme for interaction graphs analyzed in this paper, but leave exploration of this facet of latent interaction graphs to future work. 5.2 Comparing Social, Visible Interaction and Latent Interaction Graphs In this section we compare the salient characteristics of the Renrensocial, visible, andlatentinteractiongraphs usingcommon graph metrics. Degree distribution. Figure 23 plots the CCDFs of node degree for the three types of graphs. Since the latent interaction graph is directed, we plot both in-degree and out-degree. In Section 3.4 we show that latent interactions are more prevalent than visible interactions. This is reflected in the relative number of edges in the two interaction graphs, as shown in Table 3. This also leads to nodes in the latent graph having a noticeably higher degree distribution in Figure 23. However, neither of the interaction graphs have as many edges as the raw social graph, which leads to the social graph having the highest degree distribution. Interestingly, because asmallnumberofrenrenusersarefrequentprofilebrowsers,i.e. they like to visit a large number of profiles (far greater than their circle of friends), the distribution of latent out-degrees flattens out at the tail-end and never approaches %. Despite these differences, latent interaction graphs still exhibit power-law scaling. Table 3 shows similar in- and out-degree powerlaw fit alpha values for latent interaction graphs compared to the visible interaction graph and the social graph. Renren limits users to of 1, friends (2, for paying users), so all power-lawcurves decline quickly to zero, and alpha values are high. Clustering coefficient. Table 3 shows that the average clustering coefficient is.3 for the latent interaction graph, and.5 for the visible interaction graph, which are both much less than that of the social graph. This is because not all social links are accurate indicators of active social relationships, and these links with no interactions are removed in interaction graphs. This produces loose connections between neighbors, and low clustering coefficients in these graphs. A portion of the latent interactions to a profile is from non-friend strangers who randomly browse the network. Thus, links between visitors in the latent interaction graph areless intensive than friends exchanging messages, which further lowers the clustering coefficients in latent interaction graphs. Assortativity. Table 3 shows that the Renren latent interaction graph is slightly disassortative. This makes sense intuitively, as latent interactions are highly skewed towards a small subset of extremely popular users. In contrast, the other two graphs are both assortative, with the social graph being more so. This result contrastswithprevious studiesinwhichtheinteraction graph was more assortative than the social graph [29]. Average path length. The average path length of the latent interaction graph is between that of the visible interaction graph and the social graph. As the average number of links per node and the number of high-degree super-nodes decreases, the overall level of connectivity in the graph drops. This causes average path lengths to rise, especially in the visible interaction graph. 6. IMPACT ON SOCIAL APPLICATIONS In the previous section, we analyzed salient properties of the Renren social, visible interaction, and latent interaction graphs. However, it remains unknown how different graph metrics impact the performance of real-world social applications. Social application tests present new perspectives since their performance on aparticulargraphcannotbeeasilycorrelatedwithasinglegraph metric. Changes in user connectivity patterns can produce significantly different results for social network applications. In order tovali- date how much impact the choice of graphs can make on socially enhanced applications, we implement techniques from the paper Efficient influence maximization [6]. This work leverages graph properties in social networks to address information dissemination problems. We compare the effectiveness of these algorithms on the raw social graph, visible interaction graph, and latent interaction graph that are derived from our Renren measurements of the PKU network. These results allow us to validate whether socially enhanced applications require a model that takes latent interactions into account. 6.1 Efficient Influence Maximization As OSNs become increasingly popular worldwide, they also become more critical platforms for information dissemination and marketing. Understanding how to fully utilize OSNs as marketing and information dissemination platforms is a significant challenge. The influence maximization problem seeks to determine the most influential individuals who will maximum the spread of information in an OSN. Given the lack of publicly available social influence datasets, previous work [6, 14] builds statistical models based on raw social graph topologies, and designs algorithms to address influence maximization problems within these models. Weighted cascade model. The weighted cascade model relies on social links for information propagation [14]. After receiving information, a user has a single chance of activating each currently inactive neighbor. In this model, the activation probability is related to node s degree: if a person w has d w neighbors, it is activated by neighbors with probability 1/d w.chenetal.proposeinstantiating the MixedGreedyWC algorithm to implement the weighted cascade model [6]. Latent cascade model. The weighted cascade model is based on social graphs, and relies on social relationships plus the activation probability to simulate the information dissemination process.

12 Network Edges Power-Law Fit Alpha Cluster Coef. Assortativity Avg. Path Len. Social Graph 753, Visible Interaction Graph 27, Latent Interaction Graph 2,8 3.5(in) 3.39(out) Table 3: Topology measurements for latent interaction, visible interaction and social graphs. Number of Influenced Users 5 3 Latent Social Visible Number of Seeds Figure 24: Influence spread using the MixedGreedyWC algorithm on different graphs. However, we observe that information is not disseminated equally through social links. User profiles are usually only viewed by a small portion of friends, thus not all social links are active in information propagation. Moreover, a portion of the visits to profiles can be attributed to people not connected to the user, i.e. strangers. When a user browses a profile, information in the web page is naturally propagated to that user. It is more accurate to represent information dissemination by links in latent interaction graphs than by passive friendship links in the social graph. Thus, to take latent interaction graphs into account we define the latent cascade model. When a person receives information, they have a single chance to activate inactive neighbors, who have directed links pointing to that person in the latent interaction graph. To transform the visitor counts from our month-long measurement into activation probabilities, we calculate the number of unique visitors for every user and determine the most popular user. We then compute the activation probability of every user by normalizing that user s number of unique visitors by the maximum value. This approximates an activation probability using the visit rate normalized to the most popular profile. We use visits from unique users and exclude repeated visits here, because the first visit contributes the most to the information propagation, and repeated follow-up visits areless likely to propagate information. Visible cascade model. The visible cascade model is built atop visible interaction graphs, in a similar fashion to the latent cascade model. The information dissemination path is decided by visible interaction events, and the per node activation probability is determined using the same method as in the latent cascade model. 6.2 Experimental Results For our experiments, we use the MixedGreedyWC algorithm [6] to find the most influential individuals in each of our three models, and then compute the number of people influenced. We vary the set of seed users to the MixedGreedyWC algorithm from 1 to in our tests and observe the effects on influence spread. Figure 24 shows influence spread versus seed set size for our three models. Influence in the weighted and latent cascade model both increase quickly in the beginning. Eventually, as more seeds are selected, the number of people influenced in latent cascade model surpasses the weighted model. The reason for this is that although social graphs have a large amount of links, the activation probability is generally low. This limits the spread of information to well connected components of the graph. Conversely, latent interaction graphs are constructed by page viewings, which correspond to higher activation probability. This is in accordance withrealsituations: people are likely to receive information when they browse profiles, while information cannot be disseminated through inactive social links. These high probabilities guarantee that information is progressively disseminated through the limited number of links in the latent interaction graph. Previous sections show that visible interaction graphs have the least number of links. Thus, although activation probabilities are relatively high, the visible cascade model reaches the smallest influence spread due to the dearth of links. 7. RELATED WORK Much effort has been put into understanding the structure of large-scale online social networks [8]. Ahn et al. analyze topological characteristics of Cyworld, MySpace and Orkut [1]. Mislove et al. measure the structure of Flickr, YouTube, LiveJournal, and Orkut [22], and observe the growth of the Flickr social network [21]. Java et al. study the topological and geographical properties of Twitter [13]. Huang et al. measure user prestige and visible interaction preference in Renren [12]. To the best of our knowledge, our measurement of the Renren network provides the largest non-twitter social graph to date, with 42,115,59 users and 1,657,273,875 friendship links. Most of Renren s topological properties are similar to those of other OSNs, including power-law degree distribution and small world properties. Researchers have also studied the visible interaction network. Leskovec et al. analyze the instant messaging network, whichcontains the largest amount of user conversations ever published [19]. Valafar et al. characterize indirect fan-owner interactions via photos among users in Flickr [27]. Chun et al. observe that visible interactions are almost bidirectional in Cyworld [7]. Wilson et al. show the structure of the interaction graph differs significantly from the social network in Facebook [29]. Viswanath et al. observe that social links in the activity network tend to come and go quickly over time [28]. Finally, a recent study from Northwestern and UC Santa Barbara quantified the role of spam and phishing attacks in Facebook wall posts [1]. Benevenuto et al. collect detailed click-stream data from a Brazilian social network aggregator, and measure silent activities like browsing [3]. Schneider et al. extract click-streams from passively monitored network traffic and make similar measurements [25]. We analyze latent interactions from a different perspective than these existing works by leveraging data that is intrinsic to the OSN and not inferred from a third-party. Ideally, we would like to perform a detailed comparison between our dataset and prior studies using click-stream datasets. Unfortunately, the sensitive natureof these datasets make their distribution challenging. At publication time, we are currently unaware of any publicly available clickstream dataset.

13 Some researchers have performed initial studies on information propagation and user influence in OSNs. Cha et al. present a detailed analysis of popularity and dissemination of photographs on Flickr [5]. They find that popular users with high in-degree are not necessarily influential in terms of spawning subsequent, viral interactions in the form of retweets or mentions on Twitter [4]. Our Renren data confirms these results, as we show that factors like number of friends and amount of user-generated content produced are not strongly correlated with popularity. 8. CONCLUSIONS Latent user interactions make up the large majority of user activity events on OSNs. In this paper, we present a comprehensive study of both visible and latent user interactions in the Renren OSN. Our data includes detailedvisit histories totheprofiles of 61,5 Renren users over a 9-day period (September to November 9). We compute a single visitor history for each profile by using anoveltechniquetomergevisitorlogsfrommultipleconsecutive crawls. We analyze profile visit histories to study questions ofuser popularity and reciprocity for profile browsing behavior, and the link between passive profile browsing and active comments. Our analysis reveals interesting insights into the nature of user popularity in OSNs. We observe that user behavior changes for latent interactions: more users participate, users do not feel theneed to reciprocate visits, and visits by non-friends make up a significant portion of views to most user profiles. We also see that visits to user profiles generate more active interactions (comments) than visits to photos or diary pages. Using profile browsing events, we construct latent interaction graphs as a more accurate representation of meaningful peer interactions. Analysis of latent interaction graphs derived from our Renren data reveal characteristics that fall between visible interaction graphs and social graphs. This confirms the intuition that latent interactions are less limited by constraints such as time and energy, but more meaningful (and thus sparser) than the social graph. Finally, our measurement study also includes an exhaustive crawl of the largest connected component in the Renren social graph. The resulting graph is one of the biggest of its kind, with more than 42 million nodes and 1.6 billion edges. Other than the proprietary Cyworld dataset, this is the only social graph we know of that covers % of a large social graph component. Given its size and comprehensiveness, we are currently investigating different options for sharing this dataset with the research community. Acknowledgments We thank the anonymous reviewers for their valuable comments. This work is supported in part by National Science Foundation of China under project #673183, #87351, the National Basic Research Program of China under Grant No.11CB3235, and Doctoral Funding of MOE #144. The UCSB team is supported by the NSF under CNS , IIS , and IIS Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. 9. REFERENCES [1] AHN, Y.-Y.,HAN, S.,KWAK, H.,MOON, S.B.,AND JEONG,H.Analysisoftopologicalcharacteristicsofhuge online social networking services. In Proc. of World Wide Web Conference (7). [2] BARABASI, A.-L.,AND ALBERT,R.Emergenceofscaling in random networks. Science 286 (1999). [3] BENEVENUTO,F.,RODRIGUES, T.,CHA, M.,AND ALMEIDA,V.Characterizinguserbehaviorinonlinesocial networks. In Proc. of ACM Internet Measurement Conference (9). [4] CHA, M.,HADDADI, H.,BENEVENUTO,F.,AND GUMMADI, K.Measuringuserinfluenceintwitter:The million follower fallacy. In Proc. of International AAAI Conference on Weblogs and Social Media (ICWSM) (May 1). [5] CHA, M.,MISLOVE,A.,AND GUMMADI, K.A measurement-driven analysis of information propagation in the flickr social network. In Proc. of World Wide Web Conference (9). [6] CHEN, W.,WANG, Y.,AND YANG, S.Efficientinfluence maximization in social networks. In Proc. of ACM Conference on Knowledge Discovery and Data Mining (June 9). [7] CHUN, H.,KWAK, H.,EOM, Y.H.,AHN, Y.-Y.,MOON, S. B., AND JEONG,H.Comparisonofonlinesocialrelations in volume vs interaction: a case study of cyworld. In Proc. of ACM Internet Measurement Conference (8). [8] FU, F.,LIU, L.,AND WANG, L.Empiricalanalysisof online social networks in the age of web 2.. Physica A 387, 2 3 (8), [9] GANNES, L.Whensocialreplacessearch,whatcanyoudo to monetize? GigaOM, March 1. [1] GAO, H.,HU, J.,WILSON,C.,LI, Z.,CHEN, Y.,AND ZHAO, B.Y.Detectingandcharacterizingsocialspam campaigns. In Proc. of ACM Internet Measurement Conference (Melbourne, Australia, November 1). [11] GRUHL, D.,GUHA, R.,LIBEN-NOWELL,D.,AND TOMKINS, A.Informationdiffusionthroughblogspace.In Proc. of World Wide Web Conference (4). [12] HUANG, L.,AND XIA, Z.Measuringuserprestigeand interaction preference on social network site. In Proc. of ACIS-ICIS (9). [13] JAVA, A.,SONG, X.,FININ,T.,AND TSENG, B.L.Why we twitter: An analysis of a microblogging community. In Proc. of WebKDD/SNA-KDD (7). [14] KEMPE,D.,KLEINBERG,J.M.,AND TARDOS, Ï. Maximizing the spread of influence through a social network. In Proc. of ACM Conference on Knowledge Discovery and Data Mining (3). [15] KIRKPATRICK,M.Socialnetworkingnowmorepopular than , report finds. ReadWriteWeb, March 9. [16] KWAK, H.,LEE,C.,PARK, H.,AND MOON, S.B.Whatis twitter, a social network or a news media? In Proc. of World Wide Web Conference (Raleigh, NC, April 1). [17] LAMPE, C.,ELLISON,N.,AND STEINFIELD,C.Afamiliar face(book): profile elements as signals in an online social network. In Proc. of CHI (7). [18] LEHMANN,E.L.,AND D ABRERA,H.J.M. Nonparametrics: Statistical Methods Based on Ranks. Prentice-Hall, [19] LESKOVEC,J.,AND HORVITZ, E.Planetary-scaleviewson alargeinstant-messagingnetwork.inproc. of World Wide Web Conference (8). [] MILGRAM,S.Thesmallworldproblem.Psychology Today 1 (1967). [21] MISLOVE,A.,KOPPULA, H.S.,GUMMADI, K.P., DRUSCHEL,P.,AND BHATTACHARJEE,B.Growthofthe flickr social network. In Proc. of WOSN (8).

14 [22] MISLOVE,A.,MARCON, M.,GUMMADI, P.K., DRUSCHEL, P.,AND BHATTACHARJEE,B.Measurement and analysis of online social networks. In Proc. of ACM Internet Measurement Conference (7). [23] Opengraph. [24] The renren social network. [25] SCHNEIDER,F.,FELDMANN,A.,KRISHNAMURTHY,B., AND WILLINGER,W.Understandingonlinesocialnetwork usage from a network perspective. In Proc. of ACM Internet Measurement Conference (9). [26] SORKIN, A.R.Facebooktops5millionusers.NewYork Times Blog, June 1. [27] VALAFAR, M.,REJAIE,R.,AND WILLINGER,W.Beyond friendship graphs: A study of user interactions in flickr. In Proc. of WOSN (9). [28] VISWANATH,B.,MISLOVE,A.,CHA, M.,AND GUMMADI, K.P.Ontheevolutionofuserinteractionin facebook. In Proc. of WOSN (9). [29] WILSON,C.,BOE, B.,SALA, A.,PUTTASWAMY, K.P.N., AND ZHAO, B.Y.Userinteractionsinsocialnetworksand their implications. In Proc. of ACM Eurosys (9). [3] YAROW, J.Facebookwasmorepopularintheu.s.than google last week. BusinessInsider.com, March 1.

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Characterizing User Behavior in Online Social Networks

Characterizing User Behavior in Online Social Networks Characterizing User Behavior in Online Social Networks Fabrício Benevenuto Tiago Rodrigues Meeyoung Cha Virgílio Almeida Computer Science Department, Federal University of Minas Gerais, Brazil Max Planck

More information

Beyond Social Graphs: User Interactions in Online Social Networks and their Implications

Beyond Social Graphs: User Interactions in Online Social Networks and their Implications Beyond Social Graphs: User Interactions in Online Social Networks and their Implications CHRISTO WILSON, ALESSANDRA SALA, KRISHNA P. N. PUTTASWAMY, and BEN Y. ZHAO, University of California Santa Barbara

More information

The Impact of YouTube Recommendation System on Video Views

The Impact of YouTube Recommendation System on Video Views The Impact of YouTube Recommendation System on Video Views Renjie Zhou, Samamon Khemmarat, Lixin Gao College of Computer Science and Technology Department of Electrical and Computer Engineering Harbin

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

Exploring Big Data in Social Networks

Exploring Big Data in Social Networks Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about

More information

A Measurement-driven Analysis of Information Propagation in the Flickr Social Network

A Measurement-driven Analysis of Information Propagation in the Flickr Social Network A Measurement-driven Analysis of Information Propagation in the Flickr Social Network Meeyoung Cha MPI-SWS Campus E1 4 Saarbrücken, Germany mcha@mpi-sws.org Alan Mislove MPI-SWS Campus E1 4 Saarbrücken,

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Measurement and Analysis of Online Social Networks

Measurement and Analysis of Online Social Networks Measurement and Analysis of Online Social Networks Alan Mislove Massimiliano Marcon Krishna P. Gummadi Peter Druschel Bobby Bhattacharjee Max Planck Institute for Software Systems Rice University University

More information

Online Reputation Management Services

Online Reputation Management Services Online Reputation Management Services Potential customers change purchase decisions when they see bad reviews, posts and comments online which can spread in various channels such as in search engine results

More information

Google+ or Google-? Dissecting the Evolution of the New OSN in its First Year

Google+ or Google-? Dissecting the Evolution of the New OSN in its First Year Google+ or Google-? Dissecting the Evolution of the New OSN in its First Year Roberto Gonzalez, Ruben Cuevas Universidad Carlos III de Madrid {rgonza1,rcuevas}@it.uc3m.es Reza Motamedi, Reza Rejaie University

More information

Information Network or Social Network? The Structure of the Twitter Follow Graph

Information Network or Social Network? The Structure of the Twitter Follow Graph Information Network or Social Network? The Structure of the Twitter Follow Graph Seth A. Myers, Aneesh Sharma, Pankaj Gupta, and Jimmy Lin Twitter, Inc. @seth_a_myers @aneeshs @pankaj @lintool ABSTRACT

More information

Web Analytics Definitions Approved August 16, 2007

Web Analytics Definitions Approved August 16, 2007 Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative

More information

WebSphere Commerce V7 Feature Pack 3

WebSphere Commerce V7 Feature Pack 3 WebSphere Commerce V7 Feature Pack 3 Precision marketing updates 2011 IBM Corporation WebSphere Commerce V7 Feature Pack 3 includes some precision marketing updates. There is a new trigger, Customer Checks

More information

Real vs. Synthetic Web Performance Measurements, a Comparative Study

Real vs. Synthetic Web Performance Measurements, a Comparative Study Real vs. Synthetic Web Performance Measurements, a Comparative Study By John Bartlett and Peter Sevcik December 2004 Enterprises use today s Internet to find customers, provide them information, engage

More information

Why email marketing. 7 reasons why email marketing will help your business grow

Why email marketing. 7 reasons why email marketing will help your business grow Why email marketing 7 reasons why email marketing will help your business grow WHY EMAIL MARKETING: 7 REASONS WHY USING EMAIL MARKETING CAN HELP YOUR BUSINESS GROW 1 Table of contents Introduction 3 has

More information

User Interactions in Social Networks and their Implications

User Interactions in Social Networks and their Implications User Interactions in Social Networks and their Implications Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Y. Zhao Computer Science Department, University of California at

More information

Six Degrees of Separation in Online Society

Six Degrees of Separation in Online Society Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn

More information

Live Chat Customer Happiness ReporT

Live Chat Customer Happiness ReporT AUGUST 2012 Live Chat Customer Happiness ReporT How to make customers happy through online chat. Brought to you by TABLE OF CONTENTS 01. INTRODUCTION 02. DATA 03. KEY RESULTS 04. MAIN METRICS 3 4 5 6 a.

More information

Overview of the Stateof-the-Art. Networks. Evolution of social network studies

Overview of the Stateof-the-Art. Networks. Evolution of social network studies Overview of the Stateof-the-Art in Social Networks INF5370 spring 2013 Evolution of social network studies 1950-1970: mathematical studies of networks formed by the actual human interactions Pandemics,

More information

Capturing Meaningful Competitive Intelligence from the Social Media Movement

Capturing Meaningful Competitive Intelligence from the Social Media Movement Capturing Meaningful Competitive Intelligence from the Social Media Movement Social media has evolved from a creative marketing medium and networking resource to a goldmine for robust competitive intelligence

More information

The State of Inbound Lead Generation

The State of Inbound Lead Generation www.hubspot.com The State of Inbound Lead Generation Analysis of lead generation best practices used by over 1,400 small- and medium-sized businesses March 2010 Contents Summary... 3 Introduction... 4

More information

Content Marketing Integration Workbook

Content Marketing Integration Workbook Content Marketing Integration Workbook 730 Yale Avenue Swarthmore, PA 19081 www.raabassociatesinc.com info@raabassociatesinc.com Introduction Like the Molière character who is delighted to learn he has

More information

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS

More information

SOCIAL RECRUITING ACTIVITY REPORT

SOCIAL RECRUITING ACTIVITY REPORT THE 2012 SOCIAL RECRUITING ACTIVITY REPORT THE DEFINITIVE LOOK AT SOCIAL MEDIA USAGE IN RECRUITINGG TM WWW.BULLHORNREACH.COM @BULLHORNREACH FEBRUARY 2012 COPYRIGHT 2012 BULLHORN, INC. ALL RIGHTS RESERVED.

More information

Web Browsing Quality of Experience Score

Web Browsing Quality of Experience Score Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...

More information

SEO 360: The Essentials of Search Engine Optimization INTRODUCTION CONTENTS. By Chris Adams, Director of Online Marketing & Research

SEO 360: The Essentials of Search Engine Optimization INTRODUCTION CONTENTS. By Chris Adams, Director of Online Marketing & Research SEO 360: The Essentials of Search Engine Optimization By Chris Adams, Director of Online Marketing & Research INTRODUCTION Effective Search Engine Optimization is not a highly technical or complex task,

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

"SEO vs. PPC The Final Round"

SEO vs. PPC The Final Round "SEO vs. PPC The Final Round" A Research Study by Engine Ready, Inc. Examining The Role Traffic Source Plays in Visitor Purchase Behavior January 2008 Table of Contents Introduction 3 Definitions 4 Methodology

More information

Insights for Microsoft Dynamics CRM Online User s Guide December 2014

Insights for Microsoft Dynamics CRM Online User s Guide December 2014 Insights for Microsoft Dynamics CRM Online User s Guide December 2014 Copyright This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web

More information

WhatsUp Gold v16.1 Wireless User Guide

WhatsUp Gold v16.1 Wireless User Guide WhatsUp Gold v16.1 Wireless User Guide Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 3 Wireless licensing and accessibility... 5 Using WhatsUp Gold Wireless Discovering wireless devices...

More information

Table of Contents. Copyright 2011 Synchronous Technologies Inc / GreenRope, All Rights Reserved

Table of Contents. Copyright 2011 Synchronous Technologies Inc / GreenRope, All Rights Reserved Table of Contents Introduction: Gathering Website Intelligence 1 Customize Your System for Your Organization s Needs 2 CRM, Website Analytics and Email Integration 3 Action Checklist: Increase the Effectiveness

More information

Presented By: Web Analytics 101. Avoid Common Mistakes and Learn Best Practices. June 2012. Lubabah Bakht, CEO, Vitizo

Presented By: Web Analytics 101. Avoid Common Mistakes and Learn Best Practices. June 2012. Lubabah Bakht, CEO, Vitizo Presented By: Web Analytics 101 Avoid Common Mistakes and Learn Best Practices June 2012 Lubabah Bakht, CEO, Vitizo Web Analytics 101, Lubabah Bakht, June 2012 This 12-page whitepaper provides a deep understanding

More information

Social Network Mining

Social Network Mining Social Network Mining Data Mining November 11, 2013 Frank Takes (ftakes@liacs.nl) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics

More information

An Analysis of Verifications in Microblogging Social Networks - Sina Weibo

An Analysis of Verifications in Microblogging Social Networks - Sina Weibo An Analysis of Verifications in Microblogging Social Networks - Sina Weibo Junting Chen and James She HKUST-NIE Social Media Lab Dept. of Electronic and Computer Engineering The Hong Kong University of

More information

smart. uncommon. ideas.

smart. uncommon. ideas. smart. uncommon. ideas. Executive Overview Your brand needs friends with benefits. Content plus keywords equals more traffic. It s a widely recognized onsite formula to effectively boost your website s

More information

Android App Marketing and Google Play

Android App Marketing and Google Play Android App Marketing and Google Play WHAT YOU NEED TO KNOW Learn how to improve Android app discovery, drive more installs, and generate long-term, loyal usage. TO SUCCEED, MARKETERS NEED VISIBILITY.

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

EVILSEED: A Guided Approach to Finding Malicious Web Pages

EVILSEED: A Guided Approach to Finding Malicious Web Pages + EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of

More information

Evolution of a Location-based Online Social Network: Analysis and Models

Evolution of a Location-based Online Social Network: Analysis and Models Evolution of a Location-based Online Social Network: Analysis and Models Miltiadis Allamanis Computer Laboratory University of Cambridge ma536@cam.ac.uk Salvatore Scellato Computer Laboratory University

More information

IBM SPSS Modeler Social Network Analysis 15 User Guide

IBM SPSS Modeler Social Network Analysis 15 User Guide IBM SPSS Modeler Social Network Analysis 15 User Guide Note: Before using this information and the product it supports, read the general information under Notices on p. 25. This edition applies to IBM

More information

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach Unlocking The Value of the Deep Web Harvesting Big Data that Google Doesn t Reach Introduction Every day, untold millions search the web with Google, Bing and other search engines. The volumes truly are

More information

Analysis of Stock Symbol Co occurrences in Financial Articles

Analysis of Stock Symbol Co occurrences in Financial Articles Analysis of Stock Symbol Co occurrences in Financial Articles Gregory Kramida (gkramida@cs.umd.edu) Introduction Stock market prices are influenced by a wide variety of factors. Undoubtedly, market news

More information

Last Updated: 08/27/2013. Measuring Social Media for Social Change A Guide for Search for Common Ground

Last Updated: 08/27/2013. Measuring Social Media for Social Change A Guide for Search for Common Ground Last Updated: 08/27/2013 Measuring Social Media for Social Change A Guide for Search for Common Ground Table of Contents What is Social Media?... 3 Structure of Paper... 4 Social Media Data... 4 Social

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

The Big Data Paradigm Shift. Insight Through Automation

The Big Data Paradigm Shift. Insight Through Automation The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.

More information

FACEBOOK FOR NONPROFITS

FACEBOOK FOR NONPROFITS SOCIAL MEDIA TIPS & TRICKS FACEBOOK FOR NONPROFITS 10 Tips to Get the Most Out of Facebook 1. Be helpful. If someone asks a question on your Facebook page, respond. If someone shares feedback, thank them

More information

Understanding and Specifying Social Access Control Lists

Understanding and Specifying Social Access Control Lists Understanding and Specifying Social Access Control Lists Mainack Mondal MPI-SWS mainack@mpi-sws.org Krishna P. Gummadi MPI-SWS gummadi@mpi-sws.org Yabing Liu Northeastern University ybliu@ccs.neu.edu Alan

More information

How are your business programs adapting admissions content to meet today s mobile demands?

How are your business programs adapting admissions content to meet today s mobile demands? How are your business programs adapting admissions content to meet today s mobile demands? Surveying the Mobile Habits of MBA Applicants Introduction: Mobile Is Even More Important Than You Think Although

More information

Sampling Biases in IP Topology Measurements

Sampling Biases in IP Topology Measurements Sampling Biases in IP Topology Measurements Anukool Lakhina with John Byers, Mark Crovella and Peng Xie Department of Boston University Discovering the Internet topology Goal: Discover the Internet Router

More information

An Alternative Web Search Strategy? Abstract

An Alternative Web Search Strategy? Abstract An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on

More information

Understanding Graph Sampling Algorithms for Social Network Analysis

Understanding Graph Sampling Algorithms for Social Network Analysis Understanding Graph Sampling Algorithms for Social Network Analysis Tianyi Wang, Yang Chen 2, Zengbin Zhang 3, Tianyin Xu 2 Long Jin, Pan Hui 4, Beixing Deng, Xing Li Department of Electronic Engineering,

More information

Transforming Big Data Into Smart Advertising Insights. Lessons Learned from Performance Marketing about Tracking Digital Spend

Transforming Big Data Into Smart Advertising Insights. Lessons Learned from Performance Marketing about Tracking Digital Spend Transforming Big Data Into Smart Advertising Insights Lessons Learned from Performance Marketing about Tracking Digital Spend Transforming Big Data Into Smart Advertising Insights Lessons Learned from

More information

2 nd Annual Social Media Study

2 nd Annual Social Media Study 2 nd Annual Social Media Study Contact: Aliza Freud CEO & Founder, SheSpeaks aliza@shespeaks.com October 20, 2009 Study Overview In 2008, we conducted a survey of our SheSpeaks members, to understand their

More information

An Oracle White Paper September 2012. Managing the Social Media Mix

An Oracle White Paper September 2012. Managing the Social Media Mix An Oracle White Paper September 2012 Managing the Social Media Mix Introduction The growth in social media has overwhelmed many marketers. Things are moving so fast that many brand managers stay busy keeping

More information

Using Networks to Visualize and Understand Participation on SourceForge.net

Using Networks to Visualize and Understand Participation on SourceForge.net Nathan Oostendorp; Mailbox #200 SI708 Networks Theory and Application Final Project Report Using Networks to Visualize and Understand Participation on SourceForge.net SourceForge.net is an online repository

More information

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results Evaluation of a New Method for Measuring the Internet Distribution: Simulation Results Christophe Crespelle and Fabien Tarissan LIP6 CNRS and Université Pierre et Marie Curie Paris 6 4 avenue du président

More information

How To Choose The Right Affiliate Tracking Software

How To Choose The Right Affiliate Tracking Software How To Choose The Right Affiliate Tracking Software Affiliate Software Ebook Table of Contents About this guide Affiliate Marketing Main criteria Tracking reliability Integration methods Feature set Mobile

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

Social Recruiting How to Effectively Use Social Networks to Recruit Talent

Social Recruiting How to Effectively Use Social Networks to Recruit Talent Social Recruiting How to Effectively Use Social Networks to Recruit Talent Introduction As a recruiter, you want to find the most qualified, talented, and largest pool of applicants. LinkedIn, Facebook,

More information

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS Carlos Andre Reis Pinheiro 1 and Markus Helfert 2 1 School of Computing, Dublin City University, Dublin, Ireland

More information

IBM SPSS Direct Marketing 23

IBM SPSS Direct Marketing 23 IBM SPSS Direct Marketing 23 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 23, release

More information

Strong and Weak Ties

Strong and Weak Ties Strong and Weak Ties Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz April 11, 2016 Elisabeth Lex (KTI, TU Graz) Networks April 11, 2016 1 / 66 Outline 1 Repetition 2 Strong and Weak Ties 3 General

More information

How to Use. for Business

How to Use. for Business How to Use for Business http:// Become a Fan of HubSpot on Facebook: http://facebook.hubspot.com Join the Pro Marketers Group on Facebook: http://facebook.promarketers.com Grade Your Facebook Profile or

More information

Online Video in the Insurance Industry

Online Video in the Insurance Industry Whitepaper Online Video in the Insurance Industry The Importance of Video as a Marketing Tool RG Stephens & Associates Email: Rick@RGStephens.com Phone: 972-578-7895 Web: www.rgstephens.com The impact

More information

Search Engine Optimisation (SEO)

Search Engine Optimisation (SEO) WEB DESIGN DIGITAL MARKETING BRANDING ADVERTISING Keyword Research Definitely number one on the list; your entire search engine optimisation programme will revolve around your chosen Keywords. Which search

More information

Online Social Networks: Measurement, Analysis, and Applications to Distributed Information Systems

Online Social Networks: Measurement, Analysis, and Applications to Distributed Information Systems RICE UNIVERSITY Online Social Networks: Measurement, Analysis, and Applications to Distributed Information Systems by Alan E. Mislove A Thesis Submitted in Partial Fulfillment of the Requirements for the

More information

Temporal Dynamics of Scale-Free Networks

Temporal Dynamics of Scale-Free Networks Temporal Dynamics of Scale-Free Networks Erez Shmueli, Yaniv Altshuler, and Alex Sandy Pentland MIT Media Lab {shmueli,yanival,sandy}@media.mit.edu Abstract. Many social, biological, and technological

More information

T he complete guide to SaaS metrics

T he complete guide to SaaS metrics T he complete guide to SaaS metrics What are the must have metrics each SaaS company should measure? And how to calculate them? World s Simplest Analytics Tool INDEX Introduction 4-5 Acquisition Dashboard

More information

This term is also frequently used to describe the return of a piece of e-mail due to an error in the addressing or distribution process.

This term is also frequently used to describe the return of a piece of e-mail due to an error in the addressing or distribution process. Affiliate In general any external 3 rd party with whom an organisation has a mutually beneficial sales or marketing relationship, e.g. a contract sales person or other business partner. On the Internet,

More information

IBM SPSS Direct Marketing 22

IBM SPSS Direct Marketing 22 IBM SPSS Direct Marketing 22 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 22, release

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Social Media and Content Marketing.

Social Media and Content Marketing. Social Media and Content Marketing. A Guide for B2B Marketing Managers. On the Internet, marketing trends come and go faster than ever. Do you remember frames, flash intros, and even visitor counters?

More information

1. Introduction to SEO (Search Engine Optimization)

1. Introduction to SEO (Search Engine Optimization) 1. Introduction to SEO (Search Engine Optimization) SEO Introduction Brief on Search Marketing What is SEO Importance of SEO SEO Process Black hat techniques White Hat techniques SEO Algorithm SEO Industry

More information

Computer Science Teachers Association Analysis of High School Survey Data (Final Draft)

Computer Science Teachers Association Analysis of High School Survey Data (Final Draft) Computer Science Teachers Association Analysis of High School Survey Data (Final Draft) Eric Roberts and Greg Halopoff May 1, 2005 This report represents the first draft of the analysis of the results

More information

SEO: What is it and Why is it Important?

SEO: What is it and Why is it Important? SEO: What is it and Why is it Important? SearchEngineOptimization What is it and Why is it Important? The term SEO is being mentioned a lot lately, but not everyone is familiar with what SEO actually is.

More information

Strategic Sourcing Outlook: Emerging Techniques and Media

Strategic Sourcing Outlook: Emerging Techniques and Media Strategic Sourcing Outlook: Emerging Techniques and Media www.chandlermacleod.com Social Media The Future of Strategic Sourcing? It s often tempting to stick with the tried and true and focus simply on

More information

Beyond listening Driving better decisions with business intelligence from social sources

Beyond listening Driving better decisions with business intelligence from social sources Beyond listening Driving better decisions with business intelligence from social sources From insight to action with IBM Social Media Analytics State of the Union Opinions prevail on the Internet Social

More information

Driving Online Traffic and Measuring Offline Phone Conversions

Driving Online Traffic and Measuring Offline Phone Conversions Driving Online Traffic and Measuring Offline Phone Conversions Executive Summary We are in the midst of an ever-evolving digital world and every aspect of your online efforts must complement and support

More information

Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS

Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS This resource provides a sampling of tools available to produce social media metrics. The list

More information

Marketing and Promoting Your Cooperative Through Social Media. How social media can be a success for your housing cooperative

Marketing and Promoting Your Cooperative Through Social Media. How social media can be a success for your housing cooperative Marketing and Promoting Your Cooperative Through Social Media How social media can be a success for your housing cooperative The History of Social Media First email sent Geocities, first social network

More information

SEO CASE STUDY: TOM S OF MAINE. Prepared by: Reva McEachern Principal, REVA Digital Media LLC

SEO CASE STUDY: TOM S OF MAINE. Prepared by: Reva McEachern Principal, REVA Digital Media LLC SEO CASE STUDY: TOM S OF MAINE Prepared by: Reva McEachern Principal, REVA Digital Media LLC COMPETITIVE SEARCH LANDSCAPE Analysis of paid and organic 2 ADVERTISING TOTAL KEYWORDS Tom s of Maine has a

More information

On Correlating Performance Metrics

On Correlating Performance Metrics On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

SOCIAL MEDIA DID YOU KNOW: WHAT IS SOCIAL MEDIA? IGNORE IT AT YOUR PERIL! WWW.SPORTENGLANDCLUBLEADERS.COM ANYWHERE GETTING GREYER

SOCIAL MEDIA DID YOU KNOW: WHAT IS SOCIAL MEDIA? IGNORE IT AT YOUR PERIL! WWW.SPORTENGLANDCLUBLEADERS.COM ANYWHERE GETTING GREYER The world s top brands are using social media as a meaningful way of deepening relationships with their customers. Is it now time for Sport Clubs to join in? WHAT IS SOCIAL? According to the Chartered

More information

White Paper. 7 Questions to Assess Data Security in the Enterprise

White Paper. 7 Questions to Assess Data Security in the Enterprise 7 Questions to Assess Data Security in the Enterprise Table of Contents Executive Overview Typical Audit Questions Which Help to Maintain Security in the Enterprise 1. Who Has Which File/Folder Permissions?

More information

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...

More information

KICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR

KICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR KICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR Keyword Research Sources 2016 Edition Data-Driven Insights, Monitoring and Reporting for Content, SEO, and Influencer Marketing Kick your Content Marketing

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Local Search for Colleges & Universities: What You Need to Know

Local Search for Colleges & Universities: What You Need to Know Local Search for Colleges & Universities: What You Need to Know 1 Introduction 1.1 Experiment Objective 1.2 Experiment Scope 1.3 Experiment Subject 1.4 Experiment Hypotheses 2 Findings 2.1 Branded vs.

More information

Social marketing and sustainability

Social marketing and sustainability Social marketing and sustainability There are no limits to the possibilities now March 6, 2014 Learning Objectives and Agenda Learning Objectives: 1. Educate leadership about the value or potential of

More information

WebSphere Commerce V7.0

WebSphere Commerce V7.0 IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version

More information

SOCIAL MEDIA: The Tailwind for SEO & Lead Generation

SOCIAL MEDIA: The Tailwind for SEO & Lead Generation SOCIAL MEDIA: The Tailwind for SEO & Lead Generation 2 INTRODUCTION How can you translate followers into dollars and social media engagement into sales and deals? Search Engine Optimization (SEO) strategy

More information

MYTH-BUSTING SOCIAL MEDIA ADVERTISING Do ads on social Web sites work? Multi-touch attribution makes it possible to separate the facts from fiction.

MYTH-BUSTING SOCIAL MEDIA ADVERTISING Do ads on social Web sites work? Multi-touch attribution makes it possible to separate the facts from fiction. RE MYTH-BUSTING SOCIAL MEDIA ADVERTISING Do ads on social Web sites work? Multi-touch attribution makes it possible to separate the facts from fiction. Data brought to you by: In recent years, social media

More information

3.3 Patterns of infrequent interactions 3. PAIRWISE USER INTERACTIONS. 3.1 Data used. 3.2 Distribution of the number of wall posts

3.3 Patterns of infrequent interactions 3. PAIRWISE USER INTERACTIONS. 3.1 Data used. 3.2 Distribution of the number of wall posts On the Evolution of User Interaction in Facebook Bimal Viswanath Alan Mislove Meeyoung Cha Krishna P. Gummadi Max Planck Institute for Software Systems (MPI-SWS) Rice University Kaiserslautern/Saarbrücken,

More information

Social Media Glossary of Terms For Small Business Owners

Social Media Glossary of Terms For Small Business Owners Social Media Glossary of Terms For Small Business Owners Introduction As a small business, reaching your audience efficiently and cost-effectively way is critical to your success. Social media platforms

More information

Search engine marketing

Search engine marketing Search engine marketing 1 Online marketing planning PHASE 1 Current marketing situation analysis PHASE 2 Defining Strategy Setting Web Site Objective PHASE 3 Operational action programmes PHASE 4 Control

More information

An AppDynamics Business White Paper October 2013. How Much Revenue Does IT Generate? Correlating Revenue and Application Performance

An AppDynamics Business White Paper October 2013. How Much Revenue Does IT Generate? Correlating Revenue and Application Performance An AppDynamics Business White Paper October 2013 How Much Revenue Does IT Generate? Correlating Revenue and Application Performance It s no secret that IT can be seen as a cost center in many organizations

More information

2014 CONSUMER VIEWS OF EMAIL MARKETING

2014 CONSUMER VIEWS OF EMAIL MARKETING BLUEHORNET REPORT 2014 CONSUMER VIEWS OF EMAIL MARKETING Executive Summary For the third consecutive year, BlueHornet surveyed over 1,000 consumers across the United States to better understand their behavior

More information

{ { Calculating Your Social Media Marketing Return on Investment. A How-To Guide for New Social Media Marketers. Peter Ghali - Senior Product Manager

{ { Calculating Your Social Media Marketing Return on Investment. A How-To Guide for New Social Media Marketers. Peter Ghali - Senior Product Manager { { Calculating Your Social Media Marketing Return on Investment A How-To Guide for New Social Media Marketers Peter Ghali - Senior Product Manager This guide provides practical advice for developing a

More information